Read full post We’ve gathered our own thoughts on the topics chosen each week for this short series of blogs that will be published twice a week. The post National Cybersecurity Awareness Month Twitter Chats appeared first on WeLiveSecurity

Read full post The infection mechanism works well – which is crucial for determining how big of a deal a piece of malware is. The post DoubleLocker Android ransomware explained appeared first on WeLiveSecurity

Read full post ‘KRACK’ or Key Reinstallation AttaCK, as it has been labeled, means third parties could eavesdrop on a network meaning private conversations would no longer be private. The post WPA2 security issues pose serious Wi-Fi safety questions appeared...

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

Read full post True, most malware isn’t viral any more, but I don’t think that matters in this context. Nor, of course, is the EICAR file a virus, and doesn’t in any respect behave like one. The post Product Testing:...

Read full post DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them – a combination that has not been seen previously in the Android ecosystem. The post DoubleLocker:...

Read full post It’s unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor’s network, security experts...

Read full post Over the last year, a handful of cyberattacks have made news headlines and affected families. High-tech toy maker Spiral Toys was the victim of a particularly cunning hacking scheme. The maker of CloudPets stuffed animals reportedly exposed...